Filters








140 Hits in 1.4 sec

Confidential Signatures and Deterministic Signcryption [chapter]

Alexander W. Dent, Marc Fischlin, Mark Manulis, Martijn Stam, Dominique Schröder
2010 Lecture Notes in Computer Science  
We give formal security models for deterministic signcryption schemes for high-entropy and low-entropy messages, and prove encrypt-and-sign to be secure for confidential signature schemes and high-entropy  ...  Finally, we show that one can derandomize any signcryption scheme in our model and obtain a secure deterministic scheme.  ...  Acknowledgements The authors wish to thank the ECRYPT II MAYA working group on the design and analysis of primitives and protocols for interesting preliminary discussions on this topic.  ... 
doi:10.1007/978-3-642-13013-7_27 fatcat:uyq6c7vdl5bm5ofpjujwsnsbx4

Efficient Signcryption Without Random Oracles [chapter]

Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang
2006 Lecture Notes in Computer Science  
Signcryption is an asymmetric cryptographic method that simultaneously provides confidentiality and authenticity at a lower computational and communication overhead.  ...  The scheme is also efficient and comparable to the state-of-the-art signcryption schemes from pairings that is secure in the random oracle model.  ...  Under the q-Strong Diffie-Hellman (q-SDH) assumption and a candidate Double Decision Diffie-Hellman (DDDH) assumption, the confidentiality and authenticity of the signcryption scheme are proven without  ... 
doi:10.1007/11839569_43 fatcat:kocpimbqvvgc3k65rv63j3v5a4

Hybrid Signcryption Schemes with Insider Security [chapter]

Alexander W. Dent
2005 Lecture Notes in Computer Science  
That paper also demonstrated that the basic hybrid construction formalised by Cramer and Shoup [5, 9] is incapable of producing a signcryption scheme with insider security.  ...  The question of constructing a hybrid signcryption scheme with outside security was considered by Dent [7] .  ...  Acknowledgements The author would like to thank John Malone-Lee, Liqun Chen, Fred Piper, Bodo Möller, Yevgeniy Dodis and Stéphanie Alt for their helpful comments.  ... 
doi:10.1007/11506157_22 fatcat:x5tqkyoasrerdeqxjbtwocnrye

Enhanced Identity-Based Signcryption System

V. Isakkirajan et al., V. Isakkirajan et al.,, TJPRC
2019 International Journal of Computer Networking Wireless and Mobile Communications  
A combination of encryption and signature is a cryptosystem called traditional signcryption, wherein sender authentication is considered a key task to be verified by third party or judge.  ...  The paper's objective is to analyse the security and confidentiality of message and then to integrate authentication, enforceability, forward secrecy, public verifiable along with packet mechanisms.  ...  Other features of signcryption include the following: Confidentiality, Unforgeability, Integrity, and Non-repudiation and also Public verifiability and Forward secrecy of message confidentiality.  ... 
doi:10.24247/ijcnwmcjun20191 fatcat:4lt76fmhtbcutgz6xmzzaqjvwy

Identity-Based Hybrid Signcryption

Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
2009 2009 International Conference on Availability, Reliability and Security  
Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional  ...  signature-then-encryption approach.  ...  Signcryption, first proposed by Zheng [22] , is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower  ... 
doi:10.1109/ares.2009.44 dblp:conf/IEEEares/LiST09 fatcat:qauleghiwzfure53s34tfj7wdu

Signcryption Scheme Based on SCHNORR Digital Signature

Laura Savu
2012 International Journal of Peer to Peer Networks  
The paper also contains the presentation of the original Signcryption scheme, based on ElGamal digital signature and discusses the practical applications of Signcryption in real life.  ...  Part three contains the presentation of the new sygncryption scheme, Schnorr Signcryption, as a result of the combination of public key encryption and Schnorr digital signature algorithm.  ...  This scheme is named Schnorr Signcryption and it implements in a single logical step both public key encryption and digital signature, offering less costs as using these two cryptographic functions individually  ... 
doi:10.5121/ijp2p.2012.3101 fatcat:mfloitn4krbxbekofasg3b5qx4

Signcryption scheme based on schnorr digital signature [article]

Laura Savu
2012 arXiv   pre-print
The paper also contains the presentation of the original Signcryption scheme, based on ElGamal digital signature and discusses the practical applications of Signcryption in real life.  ...  This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area.  ...  This scheme is named Schnorr Signcryption and it implements in a single logical step both public key encryption and digital signature, offering less costs as using these two cryptographic functions individually  ... 
arXiv:1202.1663v1 fatcat:cfngrkm4dzdlvhsefek4k6kmam

Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve [article]

M. Toorani, A. A. Beheshti
2011 arXiv   pre-print
The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step.  ...  Several signcryption schemes are proposed throughout the years, each of them having its own problems and limitations. In this paper, the security of a recent signcryption scheme, i.e. Hwang et al.'  ...  Introduction The encryption and digital signature are two fundamental cryptographic tools that can guarantee the unforgeability, integrity, and confidentiality of communications.  ... 
arXiv:1002.3303v3 fatcat:ragshkozy5e67gpd3blga4kqsy

A Review of Elliptic Curve based Signcryption Schemes

Anuj KumarSingh
2014 International Journal of Computer Applications  
Signcryption is a new cryptographic approach which provides authentication and encryption simultaneously in a single logical step. The aim is to reduce the cost of signature-thenencryption approach.  ...  This work explores the advantages and limitations of the different signcryption schemes based on elliptic curves.  ...  And Unsigncryption algorithm is deterministic in nature which verifies the authenticity of signature and performs decryption.  ... 
doi:10.5120/17821-8769 fatcat:eentzg7llzaixjpqykgl7pvgjy

Combining Public Key Encryption with Schnorr Digital Signature

Laura Savu
2012 Journal of Software Engineering and Applications  
The paper also contains the presentation of the original Signcryption scheme, based on ElGamal digital signature and discusses the practical applications of Signcryption in real life.  ...  All these algorithms offer the possibility to transmit a message over an insecure channel providing both authenticity and confidentiality.  ...  Data confidentiality and data integrity are two of the most important functions of modern cryptography.  ... 
doi:10.4236/jsea.2012.52016 fatcat:lnmjdpret5e63atgffv6snkc7q

Chaos Based Direct Public Verifiable Signcryption Scheme

2013 IOSR Journal of Computer Engineering  
The proposed scheme uses a chaos based multi key generator to generate multiple keys for signcryption scheme, and provides high security due to its chaotic nature.  ...  This paper presents chaos based Multi message signcryption scheme with public verifiability concept. The proposed scheme works for both single recipient and multiple recipients.  ...  Acknowledgement The author(s) would like to thank faculty members and other contributor for their very useful advises.  ... 
doi:10.9790/0661-1365157 fatcat:vznu5apkkzezdijkvccvstiuea

Cryptanalysis of an Elliptic Curve-based Signcryption Scheme [article]

M. Toorani, A. A. Beheshti
2012 arXiv   pre-print
The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step.  ...  s signcryption scheme is analyzed, and it is proved that it has many security flaws and shortcomings.  ...  Preliminaries to Signcryption 3) Security: Any signcryption scheme should simultaneously fulfill the security attributes of encryption and those of a digital signature.  ... 
arXiv:1004.3521v2 fatcat:v5unpvvcx5a4jg4xwfou62pxma

Exponentiated Multiple Message Communication using Certificateless Signcryption for Mobile Network Security

Sumithra Alagarsamy, S. P. Rajagopalan
2017 International Journal of Computer Applications  
In addition, multilinear map based signcryption scheme provides the confidentiality and authenticity but it is complicated for handling when number of messages gets increased rapidly.  ...  rate compared to the state-of-the-art works. between secret and public key accordingly, if the secret and public keys are similar, the signature is valid or else the signature is invalid.  ...  The proposed Exponentiated Multilinear Vectorized Certificateless Signcryption (EMV-CLSC) technique achieves confidentiality and authentication by combining public-key encryption and digital signatures  ... 
doi:10.5120/ijca2017915705 fatcat:4eqe6i6c7jcknas6d3wpimcvpa

An Efficient and Authentication Signcryption Scheme Based on Elliptic Curves

Manoj Kumar, Pratik Gupta
2019 MATEMATIKA  
Signcryption schemes are compact and specially suited for efficiency-critical applications such as smart card dependent systems.  ...  In this paper we have proposed an efficient and efficient scheme of signcryption symmetric key solutions, using elliptic curves by reducing senders computational cost.  ...  Authors are thankful to the referees for their precious comments and suggestions, which are really help us to improve the quality of this article.  ... 
doi:10.11113/matematika.v35.n1.1042 fatcat:yo4lxzti3rgjfaafrz5pdhf5y4

Signcryption schemes with insider security in an ideal permutation model

Tarun Kumar Bansal, Xavier Boyen, Josef Pieprzyk
2019 Journal of Mathematical Cryptology  
Signcryption aims to provide both confidentiality and authentication of messages more efficiently than performing encryption and signing independently.  ...  With a careful analysis and simple tweaks, we demonstrate how different combinations of weakly secure probabilistic and deterministic encryption and signature schemes can be used to construct a strongly  ...  This signcryption algorithm provides both IND-CCA and UF-CMA security in the random oracle (RO) model assuming any deterministic OW encryption (such as basic RSA) and any weakly secure deterministic signature  ... 
doi:10.1515/jmc-2018-0006 fatcat:2gxzb6h6gvf5fnipa47qj7mrda
« Previous Showing results 1 — 15 out of 140 results